2 min read
Securing a Software-Defined Future in the Automotive Sector
For decades, cars have been equipped with multiple connected electronic control units (ECUs) that manage various functions like entertainment, route...
A graduate of Cambridge University in Computer Science, Chris has spent the majority of his career involved with the development of Hardware Security Modules (HSMs) specializing in the on-board programming of HSMs. Chris is now the Senior Solutions Architect at Cryptomathic.
2 min read
For decades, cars have been equipped with multiple connected electronic control units (ECUs) that manage various functions like entertainment, route...
5 min read
The zero-trust approach to enterprise cybersecurity assumes that no connections to corporate systems and networks should be trusted. It requires...
3 min read
The adoption of cloud computing has altered the approach organizations take toward security. Rather than concentrating on securing the perimeter of a...
3 min read
Artificial intelligence is becoming more involved in cybersecurity, with both positive and negative implications. Companies can utilize AI tools to...
5 min read
Under the GDPR, organizations must take appropriate measures to protect personal data from unauthorized access, use, disclosure, or destruction. One...
3 min read
A crypto-abstraction layer (CAL) is, in its most general sense, an application programming interface (API) - also known as a library- that hides...
8 min read
This article discusses the main phases involved in the life-cycle of a cryptographic key, and how the operational lifetime of a key and its strength...
6 min read
With the rise of e-commerce, corporations and banks were able to more easily expand their businesses and services around the world.
7 min read
This article discusses the main phases involved in the lifecycle of a cryptographic key, and how the operational lifetime of a key and its strength...